2020
DOI: 10.1016/j.future.2019.11.013
|View full text |Cite
|
Sign up to set email alerts
|

Cloud computing security taxonomy: From an atomistic to a holistic view

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
19
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 32 publications
(19 citation statements)
references
References 59 publications
0
19
0
Order By: Relevance
“…In this regard, several steps are implemented. Restriction mechanisms, access control, permission mechanisms, and authorization are examples of systems that translate users' access requests to govern the usage, entrance, and consumption of an organization's resources or network services [10]. Moreover, the access control policy restricts actions to just authorized individuals and controls all access to the organization's systems.…”
Section: Access Control Policymentioning
confidence: 99%
See 1 more Smart Citation
“…In this regard, several steps are implemented. Restriction mechanisms, access control, permission mechanisms, and authorization are examples of systems that translate users' access requests to govern the usage, entrance, and consumption of an organization's resources or network services [10]. Moreover, the access control policy restricts actions to just authorized individuals and controls all access to the organization's systems.…”
Section: Access Control Policymentioning
confidence: 99%
“…In this paper, security policies refer to tools, regulations, rules, procedures, ideas, management techniques, and best practices. Encryption, error-checking techniques, preventive systems, and detecting instructional tools may all be used to combat many security risks [10]. Such precautions are taken to, firstly, ensure that data are only accessible by authorized users, which is known as "confidentiality"; second, to ensure that data are true and accurate and that malicious software does not deface data, which is known as "integrity"; and third, "availability" refers to ensuring that all network devices are available to the real user [11].…”
Section: Introductionmentioning
confidence: 99%
“…Since most of the devices in an IoT framework have constrained resources, data are usually stored in the cloud [2]. As a result, the users can continuously upload and download data from anywhere using the internet [3]. Due to this enormous communication of IoT devices through a cloud, they are subject to malicious attacks [4].…”
Section: Introductionmentioning
confidence: 99%
“…It is causing severe security risks and breaches, allowing attackers and cybercriminals to break into clients' data and services and cause substantial potential losses to cloud infrastructure platforms and systems [12]. Some of the major cloud security breaches include security at the physical level, virtual level, and, more importantly, web-based in tier level virtualized cloud data centers [13,14]. Furthermore, there are security gaps that exist between end-user and vendor assessments of cloud security, privacy, and transparency [15].…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, there are security gaps that exist between end-user and vendor assessments of cloud security, privacy, and transparency [15]. Similarly, the majority of enterprises with sensitive data such as banks, financial institutions, insurance companies, etc., are also very reluctant to choose cloud computing services and platforms as their primary concern rotate around the integrity, privacy, secrecy, and confidentiality of their data being stored and accessed from the cloud platform [16].…”
Section: Introductionmentioning
confidence: 99%